dirtycow.ninja valuation and analysis

Robots.txt Information
Robot Path Permission
GoogleBot /
BingBot /
BaiduSpider /
YandexBot /
Meta Tags
Title Dirty COW
Description FAQ Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux
Keywords N/A
Server Information
WebSite dirtycow favicondirtycow.ninja
Host IP 104.21.38.183
Location Singapore
Related Websites
Site Rank
More to Explore
dirtycow.ninja Valuation
US$5,804,498
Last updated: 2023-04-30 13:31:46

dirtycow.ninja has Semrush global rank of 1,823,466. dirtycow.ninja has an estimated worth of US$ 5,804,498, based on its estimated Ads revenue. dirtycow.ninja receives approximately 669,750 unique visitors each day. Its web server is located in Singapore, with IP address 104.21.38.183. According to SiteAdvisor, dirtycow.ninja is safe to visit.

Traffic & Worth Estimates
Purchase/Sale Value US$5,804,498
Daily Ads Revenue US$5,358
Monthly Ads Revenue US$160,740
Yearly Ads Revenue US$1,928,880
Daily Unique Visitors 44,650
Note: All traffic and earnings values are estimates.
DNS Records
Host Type TTL Data
dirtycow.ninja. A 299 IP: 104.21.38.183
dirtycow.ninja. A 299 IP: 172.67.137.90
dirtycow.ninja. AAAA 299 IPV6: 2606:4700:3037::6815:26b7
dirtycow.ninja. AAAA 299 IPV6: 2606:4700:3034::ac43:895a
dirtycow.ninja. NS 86400 NS Record: logan.ns.cloudflare.com.
dirtycow.ninja. NS 86400 NS Record: june.ns.cloudflare.com.
dirtycow.ninja. MX 300 MX Record: 20 mx2.zoho.eu.
dirtycow.ninja. MX 300 MX Record: 50 mx3.zoho.eu.
dirtycow.ninja. MX 300 MX Record: 10 mx.zoho.eu.
dirtycow.ninja. TXT 300 TXT Record: google-site-verification=4P7Oy-fOU11FVcuPLyExFVFBx32eZpQawhMTOEM36zI
HtmlToTextCheckTime:2023-04-30 13:31:46
Home Twitter Wiki Shop CVE-2016-5195 Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel View Exploit Details FAQ What is the CVE-2016-5195? CVE-2016-5195 is the official reference to this bug. CVE (Common Vulnerabilities and Exposures) is the Standard for Information Security Vulnerability Names maintained by MITRE. Why is it called the Dirty COW bug? " A race condition was found in the way the Linux kernel’s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. " ( RH ) What makes the Dirty COW bug unique? In fact, all the boring normal bugs are _way_ more important, just because there’s a lot more of them. I don’t think some spectacular security hole should be glorified or cared about as being any more "special" than a random spectacular crash due to
HTTP Headers
HTTP/1.1 301 Moved Permanently
Date: Sat, 23 Oct 2021 07:58:35 GMT
Connection: keep-alive
Cache-Control: max-age=3600
Expires: Sat, 23 Oct 2021 08:58:35 GMT
Location: https://dirtycow.ninja/
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=huUryqrbPrJ0WNLVULuLMDLaR6tVtcS%2BuQJk9JpePaAs%2B5c5PWGH6nK908v2Ju6Uw3cj67o%2BLOFmTLj6P0sZPfXlZptQtsuRTqn8AUO%2FqL9zOX5xIiybfUNgO%2Fe9dRU7Mw%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
X-Content-Type-Options: nosniff
Server: cloudflare
CF-RAY: 6a296bce7ac12a51-ORD
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400

HTTP/2 200 
date: Sat, 23 Oct 2021 07:58:35 GMT
content-type: text/html; charset=utf-8
last-modified: Wed, 26 Oct 2016 21:40:15 GMT
vary: Accept-Encoding
access-control-allow-origin: *
expires: Sat, 23 Oct 2021 08:08:35 GMT
cache-control: max-age=600
x-proxy-cache: MISS
x-github-request-id: 2B64:5B2A:16602AE:222ADE5:6173C0AB
cf-cache-status: DYNAMIC
expect-ct: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=KE0qV93Icji2j64n6DG57y4Y8PZ6FAJtnCxUPgnPij%2FPsNqZJ4yMNkOYiFhVMm4jtCXLQrz8NeDc9ubZ2pGYVfHTBu3ZtYhZl6Eat4dELkFppZpEAVkL4b%2BqBpoNdt1uaA%3D%3D"}],"group":"cf-nel","max_age":604800}
nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
strict-transport-security: max-age=15552000; preload
x-content-type-options: nosniff
server: cloudflare
cf-ray: 6a296bcedaaf2b63-ORD
alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
dirtycow.ninja Whois Information
Domain Name: dirtycow.ninja
Registry Domain ID: 285f7f1d5e304a1d8e8325352604e113-DONUTS
Registrar WHOIS Server: whois.godaddy.com/
Registrar URL: http://www.godaddy.com/domains/search.aspx?ci=8990
Updated Date: 2020-12-03T18:28:50Z
Creation Date: 2016-10-19T18:28:49Z
Registry Expiry Date: 2021-10-19T18:28:49Z
Registrar: GoDaddy.com, LLC
Registrar IANA ID: 146
Registrar Abuse Contact Email: abuse@godaddy.com
Registrar Abuse Contact Phone: +1.4806242505
Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
Domain Status: clientRenewProhibited https://icann.org/epp#clientRenewProhibited
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
Registrant Organization: Domains By Proxy, LLC
Registrant State/Province: Arizona
Registrant Country: US
Name Server: logan.ns.cloudflare.com
Name Server: june.ns.cloudflare.com
DNSSEC: unsigned
>>> Last update of WHOIS database: 2021-09-11T19:31:06Z <<<